SciSec
2018
Conference
Site: UCAS International Conference Center (Yanqihu Campus, the
University of Chinese Academy of Sciences, 380 Huaibeizhuang, Huairou District,
Beijing, China)
Conference
Date: August, 12 – 14, 2018.
Venue:
Academic Hall (1st
Floor, Conference Building)
Guidelines
of presentation:
(1) Full paper: 25 minutes for each
oral paper. 20 minutes for presentation and 5 minutes for question and answer.
(2) Short paper & IJDCF paper:
10 minutes for each short paper. 7 minutes for presentation and 3 minutes for
question and answer.
August 11, 2018 (Saturday) |
|
17:00-18:00 |
Registration |
18:00-20:00 |
Welcome
Reception |
August 12, 2018 (Sunday) |
|
08:30-8:40 |
Opening Remarks Professor Feng
Liu, Institute of Information Engineering, Chinese Academy of
Sciences |
08:40-09:40 |
Invited Lecture
I: Speaker: Professor
Moti Yung, Google & Columbia University, USA Title: The Case
for (and against) Science of Security Session Chair: Professor
Shouhuai Xu |
09:40-10:20 |
|
10:20-12:00 |
Full Paper Presentation Session I: Metrics and
Measurements (4 papers) Session Chair: Guangzhi Qu |
10:20-10:45 |
Practical
Metrics for Evaluating Anonymous Networks Zhi Wang, Jinli Zhang, Qixu
Liu (Institute of Information Engineering, Chinese Academy of Sciences),
Xiang Cui (Cyberspace Institute of Advanced Technology, Guangzhou University)
and Junwei Su (Institute of Information Engineering,
Chinese Academy of Sciences) |
10:45-11:10 |
Advanced
Persistent Distributed Denial of Service Attack Model on Scale-Free Networks Chunming Zhang, Jingwei
Xiao and Junbiao Peng (School of Information Engineering, Guangdong Medical
University) |
11:10-11:35 |
Influence of clustering
on network robustness against epidemic propagation Yin-Wei Li, Zhen-Hao Zhang (School of
Computer Science , Nanjing University of Posts and Telecommunications),
Dongmei Fan, Yu-Rong Song and Guo-Ping Jiang (School of Automation, Nanjing
University of Posts and Telecommunications) |
11:35-12:00 |
An Attack Graph
Generation Method Based On Parallel Computing Ningyuan Cao, Kun Lv and Changzhen
Hu (Beijing Institute of Technology) |
12:00-13:30 |
Lunch |
13:30-15:30 |
Tutorial: Professor
Shouhuai Xu, University of Texas at San Antonio, USA Title: Cybersecurity
Dynamics: A Foundation for the Science of Cybersecurity |
15:30-16:00 |
Coffee Break |
16:00-17:40 |
Full Paper Presentation Session II: Cybersecurity Dynamics
(4 papers) Session Chair: Professor Guoping Jiang |
16:00-16:25 |
A note on
dependence of epidemic threshold on state transition diagram in the SEIC
cybersecurity dynamical system model Hao Qiang and Wenlian Lu (Fudan
University) |
16:25-16:50 |
Characterizing
the Optimal Attack Strategy in Cyber Epidemic Attack with Limited Resources Dingyu Yan, Feng Liu, Jia
Kun, Yaqin Zhang and Yuantian Zhang (Institute of Information Engineering,
Chinese Academy of Sciences) |
16:50-17:15 |
Computer
Viruses Propagation Model on Dynamic Switching Networks Chunming
Zhang (School of Information Engineering, Guangdong Medical University) |
17:15-18:15 |
SciSec Business
Meeting Session Chair: Professor Shouhuai Xu |
18:15-19:30 |
Dinner |
August 13, 2018 (Monday) |
|
08:30-9:30 |
Invited Lecture II:
Speaker: Dr. Yuejin
Du, Alibaba Group, China Title: Redefine
Cybersecurity Session Chair:
Professor Feng Liu |
09:30-10:00 |
Coffee Break |
10:00-11:40 |
Full Paper Presentation Session III: Attack and Defense (4
papers) Session Chair: Professor
Bo Zeng |
10:00-10:25 |
Security and protection
in optical networks Qingshan Kong, Bo Liu, Ye
Wang, and Weiqing Huang (Institute of Information Engineering, Chinese
Academy of Sciences) |
10:25-10:50 |
H-Verifier:
Verifying Confidential System State with Delegated Sandboxes Anyi Liu and Guangzhi Qu (Oakland
University) |
10:50-11:15 |
Multi-party
quantum key agreement against collective noise Xiangqian Liang, Shasha Wang,
Yonghua Zhang and Guangbao Xu (Shandong University of Science and Technology) |
11:15-11:40 |
An Inducing
Localization Scheme for Reactive Jammer in ZigBee Networks Kuan He and Bin Yu (Zhengzhou
Information Science and Technology Institute) |
11:40-12:00 |
Short Paper Presentation Session I: Attack and Defense (2
papers) Session Chair: Professor
Xiaofan Yang |
11:40-11:50 |
New Security Attack
and Defense Mechanisms Based on Negative Logic System and Its Applications Yexia Cheng (Institute of Information
Engineering, Chinese Academy of Sciences), Yuejin Du (Security Department,
Alibaba Group), Jin Peng, Shen He, Jun Fu (Department of Security Technology,
China Mobile Research Institute), and Baoxu Liu (Institute of Information
Engineering, Chinese Academy of Sciences) |
11:50-12:00 |
CyberShip: An
SDN-based Autonomic Attack Mitigation Framework for Ship Systems Rishikesh Sahay, D.A
Sepúlveda-Estay, Weizhi Meng, Christian Damsgaard Jensen andMichael Bruhn
Barfod (Technical University of Denmark) |
12:10-13:30 |
Lunch |
13:30-15:30 |
Panel Discussion:
Study Focus in Science of Cybersecurity Moderator:
Professor Shouhuai Xu Panelists:
Professor Moti Yung, Dr. Yuejin Du, Professor Bo Zeng |
15:30-15:45 |
Break |
15:45-16:25 |
Short Paper Presentation Session II: Attack and Defense (4
papers) Session Chair: Professor
Wenlian Lu |
15:45-15:55 |
Establishing an
Optimal Network Defense System: A Monte Carlo Graph Search Method Zhengyuan Zhang, Kun Lv and
Changzhen Hu (Beijing Institute of Technology) |
15:55-16:05 |
Security
Concern on Deep Learning Models Jiaxi Wu, Xiaotong Lin, Yi
Tang and Zhiqiang Lin (Guangzhou University) |
16:05-16:15 |
Defending against
Advanced Persistent Threat: A Risk Management Perspective Xiang
Zhong (Chongqing University), Lu-Xing Yang (Deakin University), Xiaofan Yang,
Qingyu Xiong, Junhao Wen (Chongqing University) and Yuan Yan Tang (University
of Macau) |
16:15-16:25 |
Economic-Driven FDI Attack in Electricity Market Datian Peng, Jianmin Dong, Qinke
Peng (Xi'an Jiaotong University), Jianan Jian, Bo Zeng and Zhi-Hong Mao (University
of Pittsburgh) |
16:25-17:00 |
Coffee Break |
17:00-17:40 |
IJDCF Paper Presentation Session: Multimedia Security and
Cryptology (4 papers) Session Chair: Professor Ju Liu |
17:00-17:10 |
A Blind Print-Recapture Robust Watermark Scheme by Calculating
Self-Convolution Mengmeng Zhang, Rongrong Ni and
Yao Zhao (Beijing Jiaotong University) |
17:10-17:20 |
Performance
Evaluation and Scheme Selection of Person Re-identification Algorithms in
Video Surveillance Yu Lu (School of Information
Science and Engineering, Shandong Agricultural University), Lingchen Gu, Ju
Liu (School of Information Science and Engineering, Shandong University) and
Peng Lan (School of Information Science and Engineering, Shandong
Agricultural University) |
17:20-17:30 |
Applying
Horner's Rule to Optimize Lightweight MDS Matrices Jian Bai, Yao Sun, Ting Li
(Institute of Information Engineering, Chinese Academy of Sciences) and
Dingkang Wang (Academy of Mathematics and Systems Science, Chinese Academy of
Sciences) |
17:30-17:40 |
Privacy-Preserving
and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a
Malicious Cloud Dawei Xie, Haining Yang, Jing Qin
(School of Mathematics, Shandong University) and Jixin Ma (School of
Computing and Mathematical Sciences, Greenwich University) |
18:00-20:30 |
SciSec 2018 Banquet Award Ceremony |
August 14, 2018 (Tuesday) |
|
8:00-11:30 |
Social Event Tour guide: Kun Jia Sightseeing of
the Hongluo Temple |
12:00-13:30 |
Lunch |
SciSec 2018 Adjourns |